You must use
text editor (e.g. MS Word) to complete your homework. Handwritten
submissions are not accepted. You should submit hard copies unless
otherwise specified.

All work is to be performed individually unless otherwise
specified. For the collaborative problems, you are encouraged to form
teams of 1-3 members (of students in this class) to cooperate
only on those problems. After discussing the problems,
please write up your answers individually. Indicate the names of the
other members in your team, if any.

You get no extra credit for working alone where collaboration is
permitted.

Projects:

Each student is required to complete a mid-size project, which includes
proposal, implementation, and final demo or paper. Students can form
project teams, each with up to three members.

You can work on original research problems. The outcome should
be a paper with original technical contribution. Your grade on
this will be judged on originality, soundness of the approach,
and quality of presentation.

You are encouraged to choose this if you are a PhD student or
a master student that has to complete a thesis.

Example Topics:

Vulnerability Analysis

Wireless Security

Intrusion Detection

Authentication

Access Control

Authorization

DNS Security

Digital Watermarking

New Attacks

Survey Paper

You can write a paper that surveys a particular field on
information security. The outcome should be a paper that summarizes
the trend in the field you have chosen. Your grade will be
judged on the completeness of the survey, the quality of the
trend analysis, and the quality of presentation.

Example topics:

Vulnerability Analysis

Wireless Security

Intrusion Detection

Authentication

Access Control

Authorization

DNS Security

Digital Watermarking

Implementation

You can implement an existing technique, protocol, or system.
The outcome should be a report the describes your implementation
and a demo to the instructor and the TA. Your grade will be
based on the quality of the report, the functionality and
robustness of the implementation.

I may require you work on your own, depending on the
complexity of the Implementation.